Planning and Implementation

Based on years of experience, LinkGard has developed its own in-house methodologies, software, and techniques. Consequently, our experts can help you design information security programs and craft the right security policy for your organization, doing it right the first time.

Security Policy Design

A data security policy is the basis of an effective security program. An organization’s security policy is a comprehensive set of documents that outlines the security requirements of an organization. Our experts will conduct comprehensive on-site IT security assessment, including interviews with a cross-section of your organization, to build a customized IT security policy for your organization.

Secure Architecture Design

If you’re building a new information system — be it a simple web site or a complex data repository — LinkGard is able to provide expert security guidance to protect it from being compromised with our intrusion detection security solutions. We have discrete network security design experience in the following fields:

Network Perimeter Protection Design (routers/firewalls)

Intrusion Detection Architecture Design (network and host-based IDS)

Secure Database Architecture Design

Secure Messaging/Communications Design (email systems)

Secure Web Infrastructure Design

Secure Wireless Infrastructure Design

Host Hardening

LinkGard experts have experience with a wide variety of platforms and applications, including Linux server security. We have developed our own procedures for hardening services that combine industry standards with our in-house expertise, resulting in rock-solid response security configurations. Our approach is to provide you with detailed guidance about each system change we recommend, informing you of the risks involved in shutting down/turning on each specific OS service.